EC-Council Certification For The Cybersecurity Professional

EC-Council's suite of certifications from Certified Ethical Hacker (CEH) to Certified Penetration Tester (CPENT) are amongst the most sought after by employers and cybersecurity professionals.  The US Department of Defense as well as the National Security Agency and Pentagon have approved several EC-Council certifications for use in works categories defined for cybersecurity roles.

The EC-Council certifications have a strong technical focus and cover a wide range of cybersecurity topics in-depth, providing successful candidates with a certification that is accepted worldwide. Their certification exams have a hands-on and theoretical component to ensure that holders have practical experience.

At Jumping Bean we offer the following EC-Council training courses.

Training Course Formats

We offer our training courses in a range of formats to suit the needs of our students and customers:

  • Short Course: This takes the form of full-day, instructor-led, training sessions. It is best suited for corporates or those who already have experience in cybersecurity but wish to take a refresher course before sitting the exam.
  • Virtual Instructor Lead Course: This is run either online full-time, as above, or part-time. The part-time training is held twice a week in the evenings, online from 6:30 - 7:30.  This is ideal for students who cannot attend full-day classes or for students who wish to work through the material between lectures to consolidate their understanding.
  • Online, Mentor lead training: This takes the form of self-paced training with access to a mentor via mail, web chat, or video call should a student require assistance to work through some key concepts or material.

Whatever your constraints we will have a format to accommodate you!

Certified Ethical Hacker Training

The Certified Ethical Hacker Certification (CEH) is internationally recognised as a professional qualification that proves the holder has the skills and knowledge necessary for a career in the cybersecurity field. This certification has been approved by the Pentagon and the US Department of Defense for inclusion in their cybersecurity training portfolio as part of their cybersecurity career development guide.

The CEH course teaches hackers the tools and techniques to gain access to systems.  It is a technical and highly addictive course that covers a wide range of technical topics and their security issues.

After completing this course, a student can view their own organisation's infrastructure from the perspective of a threat actor, whether internal or external. It will enable students to assess their own organisation's defences and responses to these threats.

CEH Course Objectives:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography

Certified Penetration Tester Training

The CPENT certification, (Certified Penetration Tester), teaches students how to conduct an effective penetration test against enterprise environments. The course objectives cover traditional networks, on-premises systems, and cloud infrastructure as well as industrial control and Operational Technologies (OT), systems such as SCADA and IoT systems.

The exam is a proctored, practical exam consisting of 2 X 12 hours sessions or 1 X 24-hour sessions. A pass mark of 70% is required for the CPENT certification and, if a score of 90% is obtained, the Licensed Penetration Tester certification (LPT) will also be awarded.

CPENT Course Objectives:

  • Introduction to Penetration Testing
  • Penetration Testing Scoping and Engagement
  • Open Source Intelligence (OSINT)
  • Social Engineering Penetration Testing
  • Network Penetration Testing – External
  • Network Penetration Testing– Internal
  • Network Penetration Testing – Perimeter Devices
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • IoT Penetration Testing
  • OT/SCADA Penetration Testing
  • Cloud Penetration Testing
  • Binary Analysis and Exploitation
  • Report Writing and Post-Testing Actions
Course Price (inc exams)
Certified Penetration TesterCPENT) R41,000

Certified Network Defender Training

The Certified Network Defender (CND) qualification is aimed at skilling students up to detect and prevent system compromise and to configure system defenses to maintain system integrity, confidentiality, and availability of information systems.

The CND course trains students to adopt a process of continuous improvement in system defenses with respect to detecting and preventing cyber-attacks.

CND is mapped to the cybersecurity education framework and work role task analysis developed by the National Initiative of Cybersecurity Education (NICE).

In addition, the certification has been approved by the Department of Defense (DoD) for the work category roles for system and network administrators.

Our training course covers the latest version of the certification. The previous version of the course, while it is still valid, is available on request.

CND Course Objectives:

  • Network Attacks and Defense Strategies
  • Administrative Network Security
  • Technical Network Security
  • Network Perimeter Security
  • Endpoint Security-Windows Systems
  • Endpoint Security-Linux Systems
  • Endpoint Security- Mobile Devices
  • Endpoint Security-IoT Devices
  • Administrative Application Security
  • Data Security
  • Enterprise Virtual Network Security
  • Enterprise Cloud Network Security
  • Enterprise Wireless Network Security
  • Network Traffic Monitoring and Analysis
  • Network Logs Monitoring and Analysis
  • Incident Response and Forensic Investigation
  • Business Continuity and Disaster Recovery
  • Risk Anticipation with Risk Management
  • Threat Assessment with Attack Surface Analysis
  • Threat Prediction with Cyber Threat Intelligence
Course Price (inc exams)
Certified Network Defender R17,500

Certified Hacking Forensic Investigator Training

The Certified Hacking Forensic Investigator (CHFI) certification trains students on how to carry out digital investigations to determine how a machine was compromised, what was compromised, who the threat actor was, and their objectives. Students will learn how to extract evidence of the attack for use in internal audits or civil or criminal cases. Investigations can cover acts of theft of trade secrets, theft of or destruction of intellectual property, fraud, and industrial espionage. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.

Our training course always covers the latest version of the certification. The previous version of the course, while it is still valid, is available on request.

Course Objectives:

  • Computer Forensics in Today's World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigation using Access Data FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness
Course Price (inc exams)
Certified Hacking Forensic Investigator R21,800

Our Clients

Absa Bank Dimension Data Teraco Discovery Health South African Revenue Service First National Bank Allan Grey multichoice CSIR Standard Bank University of Johannesburg MTN Mr Price

About Us

jumping bean training room

Jumping Bean is an open source integration & training company that's been delivering solutions to customers for over 20 years.

Our services include:


  • SLA support
  • Adhoc support
  • Hardening
  • Solutions architecture


  • SLA based support
  • Implementation support
  • Solutions Architecture
  • Performance tuning 


  • Advisory services
  • Implementation support
  • Consulting
  • SLA support
  • Training 

Big Data

  • Google & AWS Big Data support
  • Data flow architecture
  • Implementation support
  • Training


  • Advisory Services
  • SOC service
  • Security Audits & Reviews
  • Training 

Software Development

  • Mobile Apps
  • Enterprise Apps 

Cloud Consulting

  • Migration
  • Cloud provider support
  • Workflow architecture
  • Automation
  • Big Data
  • Containerisation

Long Term Partnerships

We build long relationships with our customers that helps improve our understanding of their needs. We offer customised solutions & training to meet business requirements.

Our clients include large & small businesses in South Africa & across the globe.  We offer both remote and on-site support.

Passion for Technology

We are passionate about open source & pride ourselves with living on the bleeding edge of technology innovation. Our customers lean on our practical experience with emerging technologies to ensure they get the benefits of early adopters & avoid the pitfalls.

Contact Us

Please contact us for any queries via phone or our contact us form. We will be happy to answer your questions!

Appian Place, 373 Kent Ave
South Africa
Tel: +2711-781 8014

Contact Form

Jumping Bean Contact Form!

Contact Form